First published: Mon Sep 09 2019(Updated: )
An issue was discovered in GitLab Community and Enterprise Edition 11.8.x before 11.8.10, 11.9.x before 11.9.11, and 11.10.x before 11.10.3. It allows Information Disclosure. A small number of GitLab API endpoints would disclose project information when using a read_user scoped token.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
GitLab | >=11.8.0<11.8.10 | |
GitLab | >=11.8.0<11.8.10 | |
GitLab | >=11.9.0<11.9.11 | |
GitLab | >=11.9.0<11.9.11 | |
GitLab | >=11.10.0<11.10.3 | |
GitLab | >=11.10.0<11.10.3 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2019-11605 is classified as a medium severity vulnerability due to its potential for information disclosure.
To fix CVE-2019-11605, upgrade your GitLab installation to version 11.8.10, 11.9.11, or 11.10.3 or later.
CVE-2019-11605 affects GitLab Community and Enterprise Editions versions prior to 11.8.10, 11.9.11, and 11.10.3.
CVE-2019-11605 discloses project information through certain GitLab API endpoints when using a read_user scoped token.
If you are using GitLab versions prior to 11.8.10, 11.9.11, or 11.10.3, your installation is vulnerable to CVE-2019-11605.